How they watch you from the secure iPhone

Apple iPhone is generally considered safe and the company from Cupertino does not miss the opportunity to highlight how secure its users are.

However, according to a Google employee, this is not entirely true, as the iPhone camera can be used for spying by simply hijacking applications that access the device's camera. iPhoneFelix Krause published one detailed analysis as well as a PoC video revealing how the attack works. As you will see hackers could not only have access to front and back , but they can also record the user's every move even when the hijacked application is running.

Additionally, hackers can use the to stream live from the iPhone camera to the Internet and run even more advanced to detect the user's location, see if they are in front of the camera, or run facial recognition software.

The Google expert says that Apple has already been informed of the error and as explained in its in-depth analysis, Cupertino could add an LED to the iPhone's cameras to alert users of any suspicious activity.

Meanwhile, and until Apple does something to solve the problem, users can protect themselves either by buying covers that block the camera when they are not being used or to revoke camera access from all the applications that use it.

Apple has not released any official statement about the issue, and may never do it, as it wont do it, even if it is preparing some software update.

According to the Google researcher, however, this specific problem is somewhat difficult to solve with a simple one software, that's why he suggested the addition of some LEDs.

Watch the video

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.082 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).